USN-5811-1: Sudo vulnerabilities
18 January 2023
Several security issues were fixed in Sudo.
Releases
Packages
- sudo - Provide limited super user privileges to specific users
Details
Matthieu Barjole and Victor Cutillas discovered that Sudo incorrectly
handled user-specified editors when using the sudoedit command. A local
attacker that has permission to use the sudoedit command could possibly use
this issue to edit arbitrary files. (CVE-2023-22809)
It was discovered that the Protobuf-c library, used by Sudo, incorrectly
handled certain arithmetic shifts. An attacker could possibly use this
issue to cause Sudo to crash, resulting in a denial of service. This issue
only affected Ubuntu 22.04 LTS. (CVE-2022-33070)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.10
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-5811-2: sudo, sudo-ldap
- USN-5811-3: sudo, sudo-ldap
- USN-5531-1: protobuf-c, libprotobuf-c-dev, protobuf-c-compiler, libprotobuf-c1